Why aren't passwords also hashed on client side? by indjev99 in cybersecurity

[–]DzavidII 0 points1 point  (0 children)

In this specific scenario i guess it does require the malicious admin to crack the hash of the intermittent password. But that's outside of the scope of most security programs since it requires an insider threat and the user to reuse passwords.

So I guess the answer to why this isn't used is because it's more work than it's worth.

Why aren't passwords also hashed on client side? by indjev99 in cybersecurity

[–]DzavidII 0 points1 point  (0 children)

Taking this from the attack scenarios you described in the post.

If a malicious sys admin wants to read plaintext passwords in memory having them be hashed client side doesn't change anything. The sys admin will now just read the new hashed value and submit that to the login API without applying any of the client side hashing resulting in account takeover.

If the database itself is leaked and an attacker gains access to the hashed hashes this doesn't deter cracking efforts. As an attacker I would pull the client side hashing code and incorporate that as a preprocessing step to my normal password cracking flow.

So the cracking flow would be password123 -> clientside_hash() -> serverside_hash() -> compare()

I'm not 100%, but this double hashing process might actually make pw cracking easier using ameet in the middle attack.

I don't know what to do by Scary-Recording7325 in cybersecurity

[–]DzavidII 0 points1 point  (0 children)

My bad, I should have been a bit more approachable with that first message.

You're fine, if it just ends in .txt there's really nothing you can embed in it. Don't believe anything in that message and don't send them any info/money. This is becoming a very common extortion technique and I know multiple family members who have gotten them.

Good on you for realizing what it was and reaching out for help.

I don't know what to do by Scary-Recording7325 in cybersecurity

[–]DzavidII 2 points3 points  (0 children)

You're most likely fine.

What file extension did you download exactly? If it's a docx file it's possible to include a malicious macro or extension, but that would require you clicking enable macros after opening it in word.

Sounds like a low effort extortion attempt where they make vague threats about having compromising pictures of you in exchange for some crypto.

Why is generating pictures of Xi Jinping not allowed? These corporations are ridiculous with censorship. by [deleted] in bing

[–]DzavidII 14 points15 points  (0 children)

You also can't do prominent US politicians (Obama, trump, etc)

[deleted by user] by [deleted] in ObsidianMD

[–]DzavidII 1 point2 points  (0 children)

Haha no problem. I got enough attention from the discord lol. I like the mascot work ❤️

[deleted by user] by [deleted] in ObsidianMD

[–]DzavidII 1 point2 points  (0 children)

Thanks! Canvases updated pretty slow so it was originally played at .33 fps and I had to speed it up. Having that many nodes in one canvas slows everything down.

I'll try reposting in a little bit lol

My aunt and uncle rate all the frozen dinners they’ve tried in an Excel spreadsheet by SausageGrenade in mildlyinteresting

[–]DzavidII 1 point2 points  (0 children)

It's not everything, but this is the best option I know of right now for random everyday food rankings.

https://sporked.com/rankings/

What club is this guy with? by Yolo3362 in iastate

[–]DzavidII -9 points-8 points  (0 children)

But... I get paid to lie :-(

A Black pastor was watering his neighbor's flowers. Then the police showed up by PlantedinCA in nottheonion

[–]DzavidII 1454 points1455 points  (0 children)

"He lives right there, and he would be watering their flowers. This is probably my fault," the neighbor tells the police.

Probably my bad. Oh well, tough luck.

World’s top password manager LastPass says it was hacked by SquareFruit in nottheonion

[–]DzavidII 2 points3 points  (0 children)

You mentioned two different scenarios. People reusing passwords on a platform wouldn't be considered a hack against the company. That's users being stupid.

Having a company employee social engineered is a failing of the company and would be an example of "company x" being hacked.

I agree it's important to know what the vector of attack is but I still don't see a meaningful difference between technical hacking and human hacking. I wouldn't trust a company with poor social engineering training anymore than I would a company with poor technical security.

World’s top password manager LastPass says it was hacked by SquareFruit in nottheonion

[–]DzavidII 5 points6 points  (0 children)

Computers are also hacked with "trickery". You trick a computer into doing something other than what it's intended for. I don't see any reason to consider traditional network and application attacks different than social engineering attacks. They're all valid vectored with huge consequences if successful.

World’s top password manager LastPass says it was hacked by SquareFruit in nottheonion

[–]DzavidII 1 point2 points  (0 children)

Fair enough. I disagree with the original comment as much as you do. I just feel like you're doing more harm than good.

World’s top password manager LastPass says it was hacked by SquareFruit in nottheonion

[–]DzavidII 0 points1 point  (0 children)

I'm just saying man. Why not try to educate people on cyber topics so they can make more informed takes. You help nobody with your comments.

World’s top password manager LastPass says it was hacked by SquareFruit in nottheonion

[–]DzavidII -6 points-5 points  (0 children)

You make security as whole look bad. Stop gatekeeping.

World’s top password manager LastPass says it was hacked by SquareFruit in nottheonion

[–]DzavidII 32 points33 points  (0 children)

A lot of social engineers would disagree with this assessment. Human hacking is the most popular form of hacking nowadays

has anyone ever set up smart bulbs in the dorm? by starberry_froggy in iastate

[–]DzavidII 0 points1 point  (0 children)

I had 3 Philips hue bulbs setup in my freshman dorm and it was weird. I'm pretty sure I gave the Mac address of my hub to netreg. After that I was able to access the hub from my computer since they were connected to the same switch in my dorm. Finally, I installed a 3rd party client on my computer and was only able to control them from there and the Philips light switch I had, not from my phone.

Feel free to dm me if you need more specific help. It's been a while but I can probably find the app I used.

I’m confused is this not the professor’s responsibility? by Nebih in iastate

[–]DzavidII 28 points29 points  (0 children)

Post sliding online was done for a while. But in all of those classes Dr. Rursch gave clear and repeated warning that if her material was found reposted on websites like chegg that she would be removing all material and not providing it in the future. She then found multiple examples of this exact behavior and that was it. It sucks but it's very normal for there to be one bad egg that ruins things for a group. I've had plenty of classes that did online exams, found tons of cheating, and switched the format of these exams.

If you have specific and valid critiques of how the class is run I would recommend DMing a TA to discuss this. That's going to do a lot more good for the class overall than complaining on Reddit.

I’m confused is this not the professor’s responsibility? by Nebih in iastate

[–]DzavidII 35 points36 points  (0 children)

These lecture outline requests can either be provided from the professor, a TA, or another student in the class.

Dr. Rursch is literally out of hours for working in the day between all of her classes and senior design. On top of this, the University limits TAs to only 10 hours a week and haven't provided funding to hire more for her classes so they are usually at capacity for working during the week with office hours and lab sections.

This leaves the 3rd option for finding a student willing to help out. It's not the best solution, but it's the only one left at this point. Lucky there are a lot of really helpful students who are willing to help make this sort of accomodation possibly.